Quick Tips 5 Flashcards

1
Q

A BLANK is carried out by gathering data pertaining to how something works and using that data to attack it or crack it, as in differential power analysis or electromagnetic analysis.

A

side channel attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BLANK takes place when a user gains too much access rights and permissions over time.

A

Authorization creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BLANK is a single sign-on technology developed to address issues in Kerberos. It is based upon public key cryptography (asymmetric) and uses privileged attribute servers and certificates.

A

SESAME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security information and event management implements BLANK functionality to be carried out on centralized logs for situational awareness capabilities.

A

data mining and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BLANK are either host or network based and provide behavioral (statistical) or signature (knowledge) types of functionality.

A

Intrusion detection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing is a type of social engineering attack. If it is crafted for a specific individual, it is called BLANK. If a DNS server is poisoned and points users to a malicious website, this is referred to as BLANK.

A

spear-phishing, pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A web portal is commonly made up of BLANK, which are pluggable user interface software components that present information and services from other systems.

A

portlets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The BLANK allows for the automation of user management (account creation, amendments, revocation) and access entitlement configuration related to electronically published services across multiple provisioning systems.

A

Service Provisioning Markup Language (SPML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The BLANK allows for the exchange of authentication and authorization data to be shared between security domains.

A

Security Assertion Markup Language (SAML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The BLANK is a protocol specification for exchanging structured information in the implementation of web services and networked environments.

A

Simple Object Access Protocol (SOAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BLANK environments allow for a suite of interoperable services to be used within multiple, separate systems from several business domains.

A

Service oriented architecture (SOA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BLANK is a technology that provides data communication through the use of radio waves.

A

Radio-frequency identification (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BLANK identifies potential threats and attack vectors. BLANK identifies weaknesses and lack of countermeasures.

A

Threat modeling, Vulnerability analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly